37
Security
View certificate details
You can only be sure of the correct identity of a server when the signature and the
validity period of a server certificate have been checked.
To view certificate details, open a certificate folder, and select a certificate and
Options
>
Certificate details
.
One of the following notes may appear:
Certificate trust settings
Select
Menu
>
Ctrl. Panel
>
Settings
>
General
>
Security
>
Certificate
management
.
Trusting a certificate means that you authorise it to verify web pages, email servers,
software packages, and other data. Only trusted certificates can be used to verify
services and software.
To change the trust settings, select a certificate and
Options
>
Trust settings
. Scroll
to an application field, and press the scroll key to select
Yes
or
No
. You cannot
change the trust settings of a personal certificate.
Depending on the certificate, a list of applications that can use the certificate is
displayed.
Protected content Digital Rights Management (DRM)
Other devices can send you media files that are protected by usage rights and for
which you need activation keys. Some activation keys contain unique IDs that allow
the media file provider to track the sending device. Some providers use this service
to reward people who distribute their media files to others who buy usage rights for
the files.
Protected content
enables you to elect whether providers of usage-right protected
media objects are allowed to track transfers and transactions of the objects or not.
1. Select
Menu
>
Ctrl. Panel
>
Settings
>
General
>
Security
>
Protected
content
.
2. To allow media file providers to track the files sent to you select
Yes
in
Track
protected object
.
3. To save your setting select
Back
.
Certificate not
trusted
You have not set any application to use the certificate. You may
want to change the trust settings.
Expired
certificate
The period of validity has ended for the selected certificate.
Certificate not
valid yet
The period of validity has not yet begun for the selected
certificate.
Certificate
corrupted
The certificate cannot be used. Contact the certificate issuer.
IMPORTANT:
Even if the use of certificates makes the risks involved in
remote connections and software installation considerably smaller, they
must be used correctly in order to benefit from increased security. The
existence of a certificate does not offer any protection by itself; the
certificate manager must contain correct, authentic, or trusted certificates
for increased security to be available. Certificates have a restricted lifetime.
If
Expired certificate
or
Certificate not valid yet
is shown, even if the
certificate should be valid, check that the current date and time in your
device are correct.
Before changing any certificate settings, you must make sure that you really
trust the owner of the certificate and that the certificate really belongs to the
listed owner.
Symbian installation
New Symbian operating system application.
Internet
Email and graphics.
App. Installation
New Java application.
Online certif. check
Online certificate status protocol.
VPN
Applicable to the VPN.